1.
Rasha Asker. For office management system in data mining application to secure user data, study the different encryption techniques. DE [Internet]. 2020Jun.30 [cited 2024May6];:168 -173. Available from: http://thedesignengineering.com/index.php/DE/article/view/446